High risk ANI mouse pointer Vulnerability unofficial immune patch _ virus killing

Source: Internet
Author: User
Tags rar
High risk ANI mouse pointer vulnerability unofficial immune patch

Please visit our friends to install this patch as soon as possible.
Thanks to JH's delivery
This patch is a patch developed by the unofficial organization eeye for this vulnerability (author: Derek Soeder-eeye Digital Security), which is tested to solve the problem caused by this vulnerability, and install this patch to eliminate the problem caused by this vulnerability. It is recommended that you install this patch to prevent malicious programs from endangering your system.
Note: This patch will automatically reboot the system after installation, save your work before installation, in case important information is lost. After the program is installed, a eeye Windows is generated in the Start menu-> program. ANI zero-day Patch Project, if the patch is no longer needed, you can uninstall it here. The unofficial program can be uninstalled after the official patch KB935423 has been installed (this patch is not yet published).


After installation, add a "eeye Windows animated Cursor Patch Checker.lnk" to the Start menu-> program-> startup and create AniFix.dll app_init entries. After reboot, 360 prompts the system to add a program named Eeye Windows animated Cursor Patch Checker.lnk to the startup entry, and a Anifix.dll entry for the item. eeye Windows Animated Cursor Patch Checker is the program used to detect patch updates, there is no harm, you can choose to keep it, you can delete it. Anifix.dll's App_init item is the key to its work, please be sure to allow this action, otherwise the patch will not take effect.

A buffer overflow vulnerability exists when Microsoft Windows handles malformed animated icon files (. ani) that can be exploited by a remote attacker to control the user's machine. Microsoft Windows did not correctly verify the size specified in the ANI header when handling malformed files (. ani), resulting in stack overflow vulnerabilities. If a user is deceived into using IE to visit a malicious site or open a malicious mail message, this overflow is triggered. Causes arbitrary code to be executed. Note that Windows Explorer also handles ANI files for some file extensions, such as. Ani,. Cur,. ico, and so on. The affected systems include: all versions of Microsoft Windows Vista; All versions of Microsoft Windows XP; Microsoft Windows Server 2003 SP1; Microsoft Windows Server 2003; All versions of Microsoft Windows 2000.

At present, many websites both at home and abroad begin to use this flaw to spread the malicious software and the Trojan Horse, the worm virus, this loophole's use procedure usually disguises as a picture, as long as clicks has the malicious code picture the website or the mail will be infected the malicious program, and whether is IE6 or IE7, or Firefoxopera and other non ie browsers.



Whether it is the Windows Nt2000xp2003vista operating system, there is the possibility of infection, other network applications such as QQ, MSN, various mail software, RSS software, etc. may also be affected by this vulnerability. Because multiple versions of the vulnerability use a variety of techniques, they bypass most antivirus, software, and active defense software to disable it. This has a great harm to the user's machine, once the machine does not have a patch opened the site or mail containing malicious code, viruses or malicious programs will immediately quietly run in the background, in the absence of any response to the use of the machine in the user's Trojan horse, malicious advertising software, worms and so on.

Install package Md5:4a997d7da0188acb0bd4850f8c812b80
Size: 345912 bytes
Download: Anipatch.rar
Http://dl.360safe.com/AniPatch.rar

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.